Analysis
-
max time kernel
155s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe
Resource
win7-20220812-en
General
-
Target
ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe
-
Size
606KB
-
MD5
6223351a6eec39b6e61748127ce4f210
-
SHA1
eee9ef6dd77a45f020bba75140089c047d230367
-
SHA256
ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff
-
SHA512
d388969d8fc4a2cb9474b71d3307d16f93547b9362b91d65dc9deb9ad7d366e113548b54ee01bbe68c24b907a6d9771ae3962272818117b40d44b65dd6045568
-
SSDEEP
12288:4QbE677XH+UAzrk3V58Jpvr3tZKM8+7b5MpSpvo:f3+UAzrk3oJpBZx8+P6pp
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 5076 elevation_service.exe 4516 elevation_service.exe 652 maintenanceservice.exe 4924 OSE.EXE 2268 ssh-agent.exe 4536 AgentService.exe 748 wbengine.exe 4008 TrustedInstaller.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000 OSE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000\EnableNotifications = "0" OSE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe -
Enumerates connected drives 3 TTPs 26 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: OSE.EXE File opened (read-only) \??\F: ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened (read-only) \??\H: ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened (read-only) \??\F: OSE.EXE File opened (read-only) \??\H: OSE.EXE File opened (read-only) \??\O: OSE.EXE File opened (read-only) \??\P: OSE.EXE File opened (read-only) \??\S: OSE.EXE File opened (read-only) \??\V: OSE.EXE File opened (read-only) \??\W: OSE.EXE File opened (read-only) \??\Z: OSE.EXE File opened (read-only) \??\G: ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened (read-only) \??\K: OSE.EXE File opened (read-only) \??\L: OSE.EXE File opened (read-only) \??\M: OSE.EXE File opened (read-only) \??\Q: OSE.EXE File opened (read-only) \??\G: OSE.EXE File opened (read-only) \??\I: OSE.EXE File opened (read-only) \??\J: OSE.EXE File opened (read-only) \??\N: OSE.EXE File opened (read-only) \??\R: OSE.EXE File opened (read-only) \??\Y: OSE.EXE File opened (read-only) \??\E: ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened (read-only) \??\E: OSE.EXE File opened (read-only) \??\T: OSE.EXE File opened (read-only) \??\X: OSE.EXE -
Drops file in System32 directory 58 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\msiexec.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\Agentservice.exe OSE.EXE File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\msiexec.exe OSE.EXE File opened for modification \??\c:\windows\system32\searchindexer.exe OSE.EXE File opened for modification \??\c:\windows\system32\sensordataservice.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\Agentservice.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\vssvc.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\locator.exe OSE.EXE File opened for modification \??\c:\windows\system32\spectrum.exe OSE.EXE File opened for modification \??\c:\windows\syswow64\perfhost.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\Appvclient.exe OSE.EXE File opened for modification \??\c:\windows\system32\lsass.exe OSE.EXE File opened for modification \??\c:\windows\system32\snmptrap.exe OSE.EXE File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\bafggjjm.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\snmptrap.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\vds.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\svchost.exe OSE.EXE File opened for modification \??\c:\windows\system32\dllhost.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\msdtc.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\vds.exe OSE.EXE File opened for modification \??\c:\windows\system32\fxssvc.exe OSE.EXE File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe OSE.EXE File opened for modification \??\c:\windows\system32\sgrmbroker.exe OSE.EXE File opened for modification \??\c:\windows\system32\tieringengineservice.exe OSE.EXE File created \??\c:\windows\system32\nhlfdalj.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\eoiopfpj.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\openssh\imhabbja.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\alg.exe OSE.EXE File opened for modification \??\c:\windows\system32\Appvclient.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\eqpefcif.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe OSE.EXE File opened for modification \??\c:\windows\syswow64\perfhost.exe OSE.EXE File created \??\c:\windows\system32\ainebnam.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\bolegfpp.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\searchindexer.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\ahilnnhq.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\dllhost.exe OSE.EXE File opened for modification \??\c:\windows\system32\sensordataservice.exe OSE.EXE File opened for modification \??\c:\windows\system32\alg.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\lsass.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe OSE.EXE File opened for modification \??\c:\windows\system32\svchost.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\fkcolgdq.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created \??\c:\windows\system32\ijlbieja.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\wbengine.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\msdtc.exe OSE.EXE File opened for modification \??\c:\windows\system32\vssvc.exe OSE.EXE File opened for modification \??\c:\windows\system32\fxssvc.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\locator.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\system32\spectrum.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created \??\c:\program files\windows media player\menqobjp.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Program Files\7-Zip\7zG.exe OSE.EXE File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Program Files\7-Zip\amhadgcp.tmp OSE.EXE File created \??\c:\program files\common files\microsoft shared\source engine\pklhjicn.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe OSE.EXE File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe OSE.EXE File created C:\Program Files\7-Zip\pijiegfa.tmp OSE.EXE File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\engniamd.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Program Files\7-Zip\7z.exe OSE.EXE File created C:\Program Files\7-Zip\afaqkaok.tmp OSE.EXE File created \??\c:\program files (x86)\mozilla maintenance service\nhfoadhh.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Program Files\Internet Explorer\chbiehem.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\lchpifma.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe OSE.EXE File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe OSE.EXE File created C:\Program Files\7-Zip\nklemblo.tmp OSE.EXE File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe OSE.EXE File created \??\c:\program files\google\chrome\Application\89.0.4389.114\knhlhoph.tmp ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe OSE.EXE File opened for modification C:\Program Files\7-Zip\Uninstall.exe OSE.EXE -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe OSE.EXE File opened for modification \??\c:\windows\servicing\trustedinstaller.exe OSE.EXE File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1340 5076 WerFault.exe 83 2024 4516 WerFault.exe 87 448 2356 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE 4924 OSE.EXE -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2356 ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe Token: SeAssignPrimaryTokenPrivilege 4536 AgentService.exe Token: SeBackupPrivilege 748 wbengine.exe Token: SeRestorePrivilege 748 wbengine.exe Token: SeSecurityPrivilege 748 wbengine.exe Token: SeTakeOwnershipPrivilege 4924 OSE.EXE -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" OSE.EXE Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer OSE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe"C:\Users\Admin\AppData\Local\Temp\ca9f1d43178c941f271d1fdb4e75c7be19a1a6a9f78d34c855eacc9191b874ff.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2356 -s 9402⤵
- Program crash
PID:448
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5076 -s 3922⤵
- Program crash
PID:1340
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 5076 -ip 50761⤵PID:5116
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4516 -s 1162⤵
- Program crash
PID:2024
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 560 -p 4516 -ip 45161⤵PID:2908
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:652
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4924
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2268
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 596 -p 2356 -ip 23561⤵PID:2216
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5febcf6b8e312ebfbe75125970d605c6e
SHA16fd8114daccea9ea7515ad27897e42562fe70180
SHA256ac3929c8c2ff49e9ec2b98e78e99205f138b25244333dfc31328248b7da4d85a
SHA5127857beaac33c0ff7f3fc6be53b17b36c42f522b66f47b9e46c3ef14055ee5b11ebc86d05ceff95f5d84dd083009f762b38a623b2bcde08426b59c6d94121a570
-
Filesize
808KB
MD58e0a6891c0f6097e1b900f7058034743
SHA15bcb44efc1880cc9de5504155cdfa71b8132de5a
SHA25648d2c51652662973e6a951a8de63e38fca1687a28ab1b6fd2a3106d09991fe97
SHA512afe2f379dcb47fda61ab0b6211f40eaa0b7fa583e157ac04a84fc0d9fc279f12697fa27193c8ec164869b33835ade5636ee2b30cb418834633c6ad0c417c7f8b
-
Filesize
817KB
MD5ca930dd1b726d24261ee3ac5b531f755
SHA1b49768a847467b77b83b39a3594a022b98d3a841
SHA25671d9d65b7056411042330d8de1517ecd24c1b0366b0b2b4e85b57a524ea8343e
SHA512bbd6e7c765a21ae497d323337ee07a6ddbdb0d8679e742f2adbdff90f6a8af21af5c8a7568edaacbea6eec68640f5a1404b0ed673ae7fb79bef959e1e834aee1
-
Filesize
2.0MB
MD54f16531c7c7a0813ea1bcb39dc07a7ff
SHA1a1d1ac544ed61bf759249ca3d0de2c17f8139873
SHA256037db0e182c376205096d9d6bf383aa84985919d9571ad4da2d265fc6a2930a6
SHA5121884127d1a24f3b78978a6c9ec36eff0ddbd004a22e1dbc808137ddbf3a3c7d254ec6c1893c00550e7ede1ca610aaa163a6e65f5b2a869285e9606e9311cd4ba
-
Filesize
1.7MB
MD5d436d78fcfc73c2a00cd7111430b5eaf
SHA1915af3507f059d1d02ae9557d2c4f431b1089b9a
SHA2568d2bf467c1f68f97bfe14434249e3858947707c99f9c1c552d8c2b497a1cde58
SHA5122afce854482670e065df1b27ec341182b85725f929ca48621daf568c9d52b74eb17c1a73ab1f4c20e5edb13f220752b559265f4f1aeceb1492a259f3796033bd
-
Filesize
952KB
MD5e8ef6103455c7001d07e0173c8e8388c
SHA11df59110880abf4615846d83108c35b64c7219d5
SHA2569fdb819444e6fbe58a17cde310ab45e82404c34568308c090c8aae6fcaffeab2
SHA512af4427b18b15abcd9858d170a51caa31bbb36d0bd368244e577885f7f40bc7d28bbbadaa510db942e24fa7bbe877d1a636ce8d700c709775d383a992f6d82c3b
-
Filesize
952KB
MD5e8ef6103455c7001d07e0173c8e8388c
SHA11df59110880abf4615846d83108c35b64c7219d5
SHA2569fdb819444e6fbe58a17cde310ab45e82404c34568308c090c8aae6fcaffeab2
SHA512af4427b18b15abcd9858d170a51caa31bbb36d0bd368244e577885f7f40bc7d28bbbadaa510db942e24fa7bbe877d1a636ce8d700c709775d383a992f6d82c3b
-
Filesize
2.1MB
MD5858e1228c3cb416636e51f2b5901fa95
SHA13209168a9efc73106a52741063dd9574903aef03
SHA25654de84c8b6dbc865c8b3f89e7c6c010c0a948f767035cf8814c0ff88e60bc42a
SHA512d906e668ae2d64b5e7b18be1970509270e4f3cb77657b33fdf40203d082d5ba8d35617e3becd76c67c98d4cf8e3529e432088aa4a297c1b958aee6e9f7c631c4
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de
-
Filesize
2.1MB
MD5febcf6b8e312ebfbe75125970d605c6e
SHA16fd8114daccea9ea7515ad27897e42562fe70180
SHA256ac3929c8c2ff49e9ec2b98e78e99205f138b25244333dfc31328248b7da4d85a
SHA5127857beaac33c0ff7f3fc6be53b17b36c42f522b66f47b9e46c3ef14055ee5b11ebc86d05ceff95f5d84dd083009f762b38a623b2bcde08426b59c6d94121a570
-
Filesize
808KB
MD58e0a6891c0f6097e1b900f7058034743
SHA15bcb44efc1880cc9de5504155cdfa71b8132de5a
SHA25648d2c51652662973e6a951a8de63e38fca1687a28ab1b6fd2a3106d09991fe97
SHA512afe2f379dcb47fda61ab0b6211f40eaa0b7fa583e157ac04a84fc0d9fc279f12697fa27193c8ec164869b33835ade5636ee2b30cb418834633c6ad0c417c7f8b
-
Filesize
2.0MB
MD54f16531c7c7a0813ea1bcb39dc07a7ff
SHA1a1d1ac544ed61bf759249ca3d0de2c17f8139873
SHA256037db0e182c376205096d9d6bf383aa84985919d9571ad4da2d265fc6a2930a6
SHA5121884127d1a24f3b78978a6c9ec36eff0ddbd004a22e1dbc808137ddbf3a3c7d254ec6c1893c00550e7ede1ca610aaa163a6e65f5b2a869285e9606e9311cd4ba
-
Filesize
1.5MB
MD5918e1b5a13122e6e93f9cb2ddec8eb71
SHA19b970bec7f76e31ff3b9b6b6e3644b0227c291bc
SHA256e66a9ea7081f50c573f56c5e8dcf95a3ce8b40b61719b8dccf9f549a9e2c0f74
SHA512376041b4e5a945beae6ab8c7a186f70c3362c7f5076de2d095b7b65e7ce1264e3b7c03f9fc1280fef5c8b57022ec4933482db4aec777d1827f72e7531a3bc628
-
Filesize
1.7MB
MD5d436d78fcfc73c2a00cd7111430b5eaf
SHA1915af3507f059d1d02ae9557d2c4f431b1089b9a
SHA2568d2bf467c1f68f97bfe14434249e3858947707c99f9c1c552d8c2b497a1cde58
SHA5122afce854482670e065df1b27ec341182b85725f929ca48621daf568c9d52b74eb17c1a73ab1f4c20e5edb13f220752b559265f4f1aeceb1492a259f3796033bd
-
Filesize
1.3MB
MD52014e040162289fc2f0c633cfc05d42a
SHA156d395d147bc0a4939bd2d39ed77ae6e143e90d2
SHA2567a405909dd0f0bc9bea41930ffb69a9966a1359783a684e93d7e06aa23f2e69d
SHA51209abaa0be9ad6099a174a5877e8dc5b14a5ebd6e80f49b45be156da4e19ff0ca75cf224be92a195bdc4dc7a33baba120cd882276fae6aa66614a3766e2093217
-
Filesize
1.2MB
MD54c70519170defd45e30633bf3992f6ee
SHA14ae85b41091bedc4a1b9026e6d6697df6474c52c
SHA2562ec45b1387941e5306dd354773bd323a8cd2111f4cff2e28d5c6a8f8badcc601
SHA51261ad72c4a9cce98f8b007ff819adb470bc28a07bbda6b38230973f46afec47f107f84486259288e30f2f3127000309adf7cc02819636dc6751fd93e13c03f56e
-
Filesize
724KB
MD56f6ec6b17f6af10593d20066cacccc95
SHA1678d208dbd953974ef8bc6dc8dd1d93ad306dc5f
SHA256cc80f8f9ba367b4ea7c9857a3cd2ddd89e4f131075a9d1a7dcaab0c0dc839794
SHA512320f93332b628d6bfc20583befef5d58807cd5c1e71441e402e077c7371f2eec9f5a6d841018520d3fe943b2df6d11ccfd5b4d2cc6d74bc917532caed7b3e4b0
-
Filesize
647KB
MD5500b6d4f2abbf27df96c65d068d89adf
SHA157ff4972e4bb10b6eb57520604139a7f8eb2c9ee
SHA256c583d0438b53b5765e12e1c3ea27b38a6d95adff11eb4abea604c8dbe0cd01f7
SHA51242e2567f986c827587fe0203a4220a5712928599643a642e0983cf430dbecfe3ba339bfec1fc9d977309e77803cb5ba22492dd2be6f193dc243cdca73dab600f
-
Filesize
596KB
MD58c3302e8d895e2fbb9181a4c35cd9840
SHA158ef487f40bc8864066b4c4adea3b04e3f53323d
SHA2566c89624b87dd04fa91b4869ddf7dfb45116ade2fb1fb4fa20f48191a37102c9c
SHA51268ad15ec7b3d244f70a25d70253d6a6bd3518b851ddc85badbdfbf9022fe5b39fd0c4289d31116892ce63dc38fce0f4984cefb3128be8d39bf58a38fe058eb47